People say I have not broken AACS, but players. But players are part of this system! And a system is only as strong as his weakest link. Even if players become more secure, key extraction will always be possible.

Almost the same. I use the same known-plaintext attack for both formats. But media format and encryption are slightly different. Because I already had experience with the HD-DVD, it was really easy for Blu-ray.

[…] IMHO, AACS is totally busted.
The AACS security layer is almost the same for both HD-DVD and Blu-ray, so they are both busted for good.

The only extra security layer is for the Blu-ray format, and it’s called BD+. BD+ is not there yet, and I don’t know when it will be. May be my “exploits” will speed up the adoption of BD+, we will see…

The less secure the format, the more people will buy. I know a lot of people will disagree with that, but that’s my opinion. Right now, both format are equally vulnerable. We have to wait the introduction of BD+ to see if it is really that secure…

I really respect the work of DVD Jon and his friends (he was not alone!) They do more than me. They had to reverse a cipher! I didn’t have to reverse anything. So technically speaking, it was easier to bypass AACS than CSS.

If you’re talking about AES itself (the crypto algorithm), I don’t think it will be cracked anytime soon, but we never know. May be someone will find another hole, or another way to attack AACS. You cannot attack the crypto itself, you have to attack the protocol or the procedure. When will we find another way around AACS?